Taming Virtualization

  • Authors:
  • Martim Carbone;Diego Zamboni;Wenke Lee

  • Affiliations:
  • Georgia Institute of Technology;IBM Zurich Research Laboratory;Georgia Institute of Technology

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The small size, isolation, and mediation power of an ideal hypervisor over VMs make it an interesting candidate for a trusted computing base, with applications in security research fields such as intrusion detection, integrity protection, and malware analysis, among others